Dissecting the Security and Protection Issues in Pervasive Computing

Abstract

Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks), mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.

Authors and Affiliations

Javaid Qaisar, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail

Keywords

Related Articles

Implementation of Tuned Schema Merging Approach

Schema merging is a process of integrating multiple data sources into a GCS (Global Conceptual Schema). It is pivotal to various application domains, like data ware housing and multi-databases. Schema merging requires th...

Semantic Based Cluster Content Discovery in Description First Clustering Algorithm

In the field of data analytics grouping of like documents in textual data is a serious problem. A lot of work has been done in this field and many algorithms have purposed. One of them is a category of algorithms which f...

Design and Performance of Broadband Dual Layer Circular Polarizer Based on Frequency Selective Surface for X-Band Applications

A dual-layer circular polarizer based on FSS (Frequency Selective Surface) composed of two periodic strips in xoy plane. The transmission characteristic of present structure is comprehensively investigated that convert l...

Problems and Prospects of Curbside Parking in Lahore: Policy Implications for Effective Management

Lahore is a fast-growing metropolis experiencing rapid growth in people and vehicle population. This unprecedented growth has led to urban sprawl, dependency on motorized transport, and increased parking space demands th...

Flood Management Current State, Challenges and Prospects in Pakistan: A Review

Flooding is globally a major natural hazard. Floods result in property and life loss and poor economic development. Though it is not possible to prevent the occurrence of floods, but their negative impacts could be minim...

Download PDF file
  • EP ID EP269103
  • DOI 10.22581/muet1982.1802.02
  • Views 116
  • Downloads 0

How To Cite

Javaid Qaisar, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail (2018). Dissecting the Security and Protection Issues in Pervasive Computing. Mehran University Research Journal of Engineering and Technology, 37(2), 241-266. https://europub.co.uk/articles/-A-269103